SlideShare a Scribd company logo
SECURITY SYSTEM FOR DNS
USING CRYPTOGRAPHY
OBJECTIVE
To provide security by
combining the concept of both the Digital
Signature and Asymmetric (public key)
cryptography by sending the Public key
over the Network.
Overview of DNS
 The DNS translates Internet domain and host
names to IP address. DNS automatically converts
the names we type in our Web browser address
bar to the IP addresses of Web servers hosting
those sites.
 The mapping or binding of IP addresses to host
names became a major problem in the rapidly
growing Internet and the higher level binding
effort went through.
 We got the different stages of development up to
the currently used Domain Name System.
DNS Architecture
EXISTING SYSTEM
 The existing system is manually maintained.
 It uses RSA Algorithm for key generation.
 Since it uses RSA Algorithm it is necessary to provide two
Prime numbers to generate Key Pair which results in
Mathematical and Brute force attack.
 It sends the Public key through the Network.
 Time consumption
 Low reliability
DISADVANTAGES
 Error prone
 Less operational speed
 Low speed communication
The Following function avoids the pitfalls of
the existing system
 Fast and efficient work
 Ease of access to system
 Manual Effort is reduced
PROPOSED SYSTEM
 Taking the security into consideration the best solution is
using Pseudo Random Number Generator for generating
Key Pair in a quick and more secured manner.
 Use of MD5 (or) Message Digest and Compressing the
message.
 Signature is created using Private Key and Message
Digest which is transmitted along with the Public Key.
 The transfer of the packets from each System to System
is shown using Graphical User Interface (GUI).
ADVANTAGES OF PROPOSED
SYSTEM
 They are not limited to 1024 bits like DSA
 They can use hash longer than 160 bits.
Overall Diagram
ENCRYPTION,
KEY GENERATION,
SIGNATURE
GENERATION,
SIGNATURE
VERIFICATION,
DECRYPTION
SENDER
RECEIVER
ORIGINAL
MESSAGE
ORIGINAL
MESSAGE
IMPLEMENTATION
 Authentication
 Message Encryption using Message Digest
Algorithm
 Key Generation using PRNG Algorithm
 Signature Generation
 Verifying Signature and Decrypting
MODULES
 Key Generation
 Encryption and Decryption
 Signature Creation
 Signature Verification
MODULE DESCRIPTION
KEY GENERATION
 Taking two prime numbers
 Generating random numbers
 Generating public and private keys
 The key pair (public and private key) is generated
using the Cryptography PRNG (Pseudo Random
Number Generator) Algorithm.
Key Generation
Module Design
PRNG ALGORITHM
CALL THE METHOD IN
THE CODING
GENERATE TWO RANDOM NUMBERS
(PUBLIC AND PRIVATE KEY)
DISPLAY THE KEYS IN THE
BACK END
GENERATE SIGNATURE
AND SEND
AUTHENTICATION
ENTER THE USER NAME AND
PASSWORD
AUTHENTICATION
VERIFY TEXT FILE
LOGIN
SEND MESSAGE OR ATTACHMENT
MESSAGE ENCRYPTION
MESSAGE DIGEST ALGORITHM
CONVERT EACH CHARACTER
TO ASCII CODE
CONVERT THE ASCII CODE
TO HEX CODE
ENCRYPTED MESSAGE
READ CHARACTER BY
CHARACTER
SIGNATURE GENERATION
DSA ALGORITHM
PRIVATE KEY + ENCRYPTED
TEXT FILE
GENERATE SIGNATURE
PUBLIC KEY + SIGNATURE
SEND THROUGH THE
NETWORK
VERIFYING SIGNATURE AND
DECRYPTING
DESTINATION
PUBLIC KEY ,SIGNATURE
FROM THE SENDER
GENERATE SIGNATURE USING
DSA ALGORITHM
DECRYPT THE MESSAGE
OR FILE
REPLY TO THE SOURCE
VERIFY THE SIGNATURE
IF MATCHES
DISCARD
NO MATCH
ATTACK ON ROOT SERVER
 OCTOBER 23, 2012
 Attack on root servers
 9 out of 13 servers were down
 Slowdown after 8 or more servers are down
 No noticeable slowdown observed by users
ATTACK ON MICROSOFT
 22.5 hour outage of web sites
 Series of attacks on Name servers, Jan 2001
 Reasons – attack or misconfiguration
 Intermittent access to Microsoft.com,
MSN.com
 $200 million advertising campaign
 Microsoft Web sites drew 54 million unique
visitors in December
DNS SECURITY EXTENSION
 Idea: Add a digital signature to each Name
 Information
– Signing with the zone’s private key
– Authenticating with the zone’s public key
 Main issue
– Key genereation
– DNS as Public Key Infrastructure
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS
 PROCESSOR III AND ABOVE
 20 GB HARD DISK
 256 DDR RAM
SOFTWARE REQUIREMENTS
 MICROSOFT.NET FRAMEWORK 1.1
 INTERNET INFORMATION SERVER
 BROWSER(I E OR NETSCAPE)
CONCLUSION:
The security threats for DNS
was overcome by using public key validation
and it was implemented and executed
successfully
THANK YOU

More Related Content

What's hot

Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat Security Conference
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE - ATT&CKcon
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
Infinity Tech Solutions
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
Yousof Alsatom
 
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiBSECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
The Research Council of Norway, IKTPLUSS
 
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
BlueHat Security Conference
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
Akhil Nadh PC
 
Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5
Don Kim
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
Stephane Potier
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Priyanka Aash
 
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat Security Conference
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices World
Diogo Mónica
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
Chul-Woong Yang
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
Avirot Mitamura
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
Tripwire
 

What's hot (20)

Email security
Email securityEmail security
Email security
 
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiBSECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
SECURE CLOUD STORAGE FOR REMOTE MOBILE DATA COLLECTION, Federico Mancini, UiB
 
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
 
Web Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket LayerWeb Security and SSL - Secure Socket Layer
Web Security and SSL - Secure Socket Layer
 
Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5Design and Analyze Secure Networked Systems - 5
Design and Analyze Secure Networked Systems - 5
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
 
MTLS in a Microservices World
MTLS in a Microservices WorldMTLS in a Microservices World
MTLS in a Microservices World
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 

Viewers also liked

DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally
 
Prsentation on domain name system(dns)
Prsentation on domain name system(dns)Prsentation on domain name system(dns)
Prsentation on domain name system(dns)
sarojsaroza
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
NA
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
Philippe Camacho, Ph.D.
 
Major Project Final powerpoint
Major Project Final powerpointMajor Project Final powerpoint
Major Project Final powerpoint
Rachel Donley
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
E property project documentation
E property project documentationE property project documentation
E property project documentation
Musakkhir Sayyed
 
Format Of Synopsis
Format Of SynopsisFormat Of Synopsis
Format Of Synopsis
Abdul Rahman Khawaja
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
Sheshank Priya
 

Viewers also liked (11)

DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Prsentation on domain name system(dns)
Prsentation on domain name system(dns)Prsentation on domain name system(dns)
Prsentation on domain name system(dns)
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
Major Project Final powerpoint
Major Project Final powerpointMajor Project Final powerpoint
Major Project Final powerpoint
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
E property project documentation
E property project documentationE property project documentation
E property project documentation
 
Format Of Synopsis
Format Of SynopsisFormat Of Synopsis
Format Of Synopsis
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Sample project-synopsis
Sample project-synopsisSample project-synopsis
Sample project-synopsis
 

Similar to Major project presentation

DNS.pptx
DNS.pptxDNS.pptx
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
Nathan Winters
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
Michael Earls
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
Amazon Web Services
 
Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...
FATIN FAZAIN MOHD AFFANDI
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
Amazon Web Services
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
Venkatesh Devam ☁
 
Week Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptxWeek Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptx
ArjayBalberan1
 
Windows network
Windows networkWindows network
Windows network
Jithesh Nair
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
ORG, The Public Interest Registry
 
Secure network
Secure networkSecure network
Secure network
shelusharma
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure Code
Caleb Jenkins
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
iplotnikov
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
Information Security Awareness Group
 
Network Mapping with PowerShell
Network Mapping with PowerShellNetwork Mapping with PowerShell
Network Mapping with PowerShell
Costin-Alin Neacsu
 

Similar to Major project presentation (20)

DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
The new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pkiThe new rocket science stuff in microsoft pki
The new rocket science stuff in microsoft pki
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...Towards Securing Computer Network Environment By Using Kerberos-based Network...
Towards Securing Computer Network Environment By Using Kerberos-based Network...
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Identity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage SchemeIdentity Based Secure Distributed Storage Scheme
Identity Based Secure Distributed Storage Scheme
 
Week Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptxWeek Topic Code Access vs Event Based.pptx
Week Topic Code Access vs Event Based.pptx
 
Windows network
Windows networkWindows network
Windows network
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
Secure network
Secure networkSecure network
Secure network
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure Code
 
Ssl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech clubSsl Vpn presentation at CoolTech club
Ssl Vpn presentation at CoolTech club
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
Network Mapping with PowerShell
Network Mapping with PowerShellNetwork Mapping with PowerShell
Network Mapping with PowerShell
 

Recently uploaded

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 

Recently uploaded (20)

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 

Major project presentation

  • 1. SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY
  • 2. OBJECTIVE To provide security by combining the concept of both the Digital Signature and Asymmetric (public key) cryptography by sending the Public key over the Network.
  • 3. Overview of DNS  The DNS translates Internet domain and host names to IP address. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.  The mapping or binding of IP addresses to host names became a major problem in the rapidly growing Internet and the higher level binding effort went through.  We got the different stages of development up to the currently used Domain Name System.
  • 5. EXISTING SYSTEM  The existing system is manually maintained.  It uses RSA Algorithm for key generation.  Since it uses RSA Algorithm it is necessary to provide two Prime numbers to generate Key Pair which results in Mathematical and Brute force attack.  It sends the Public key through the Network.  Time consumption  Low reliability DISADVANTAGES  Error prone  Less operational speed  Low speed communication
  • 6. The Following function avoids the pitfalls of the existing system  Fast and efficient work  Ease of access to system  Manual Effort is reduced
  • 7. PROPOSED SYSTEM  Taking the security into consideration the best solution is using Pseudo Random Number Generator for generating Key Pair in a quick and more secured manner.  Use of MD5 (or) Message Digest and Compressing the message.  Signature is created using Private Key and Message Digest which is transmitted along with the Public Key.  The transfer of the packets from each System to System is shown using Graphical User Interface (GUI).
  • 8. ADVANTAGES OF PROPOSED SYSTEM  They are not limited to 1024 bits like DSA  They can use hash longer than 160 bits.
  • 10. IMPLEMENTATION  Authentication  Message Encryption using Message Digest Algorithm  Key Generation using PRNG Algorithm  Signature Generation  Verifying Signature and Decrypting
  • 11. MODULES  Key Generation  Encryption and Decryption  Signature Creation  Signature Verification
  • 12. MODULE DESCRIPTION KEY GENERATION  Taking two prime numbers  Generating random numbers  Generating public and private keys  The key pair (public and private key) is generated using the Cryptography PRNG (Pseudo Random Number Generator) Algorithm.
  • 13. Key Generation Module Design PRNG ALGORITHM CALL THE METHOD IN THE CODING GENERATE TWO RANDOM NUMBERS (PUBLIC AND PRIVATE KEY) DISPLAY THE KEYS IN THE BACK END GENERATE SIGNATURE AND SEND
  • 14. AUTHENTICATION ENTER THE USER NAME AND PASSWORD AUTHENTICATION VERIFY TEXT FILE LOGIN SEND MESSAGE OR ATTACHMENT
  • 15. MESSAGE ENCRYPTION MESSAGE DIGEST ALGORITHM CONVERT EACH CHARACTER TO ASCII CODE CONVERT THE ASCII CODE TO HEX CODE ENCRYPTED MESSAGE READ CHARACTER BY CHARACTER
  • 16. SIGNATURE GENERATION DSA ALGORITHM PRIVATE KEY + ENCRYPTED TEXT FILE GENERATE SIGNATURE PUBLIC KEY + SIGNATURE SEND THROUGH THE NETWORK
  • 17. VERIFYING SIGNATURE AND DECRYPTING DESTINATION PUBLIC KEY ,SIGNATURE FROM THE SENDER GENERATE SIGNATURE USING DSA ALGORITHM DECRYPT THE MESSAGE OR FILE REPLY TO THE SOURCE VERIFY THE SIGNATURE IF MATCHES DISCARD NO MATCH
  • 18. ATTACK ON ROOT SERVER  OCTOBER 23, 2012  Attack on root servers  9 out of 13 servers were down  Slowdown after 8 or more servers are down  No noticeable slowdown observed by users
  • 19. ATTACK ON MICROSOFT  22.5 hour outage of web sites  Series of attacks on Name servers, Jan 2001  Reasons – attack or misconfiguration  Intermittent access to Microsoft.com, MSN.com  $200 million advertising campaign  Microsoft Web sites drew 54 million unique visitors in December
  • 20. DNS SECURITY EXTENSION  Idea: Add a digital signature to each Name  Information – Signing with the zone’s private key – Authenticating with the zone’s public key  Main issue – Key genereation – DNS as Public Key Infrastructure
  • 21. SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS  PROCESSOR III AND ABOVE  20 GB HARD DISK  256 DDR RAM SOFTWARE REQUIREMENTS  MICROSOFT.NET FRAMEWORK 1.1  INTERNET INFORMATION SERVER  BROWSER(I E OR NETSCAPE)
  • 22. CONCLUSION: The security threats for DNS was overcome by using public key validation and it was implemented and executed successfully